JFrog Acceptable Use Policy
Last Updated: July 01, 2025
This Acceptable Use Policy (“Policy”) is a guideline designed to ensure the proper use of the products and services offered by JFrog and its affiliates (“Services”) and our website(s) including https://jfrog.com/ (“Site”). This Policy supplements, and is incorporated into the applicable JFrog terms and conditions currently available at https://jfrog.com/terms-and-conditions/.
JFrog may modify this Policy at any time by posting a revised version on the Site. By using the Services or accessing the Site, you agree to the latest version of this Policy.
Prohibited Activities. You may not use, attempt to use, or allow others to use the Services or the Site in any of the following ways:
- Violations of Laws. For any fraudulent activity or in violation of any laws.
- Violating Rights of Others. To violate the rights of others.
- Inappropriate Content. To publish or store content that constitutes child sexually exploitative material, or to threaten, incite, promote, or actively encourage violence, terrorism, discrimination, bias or other serious harm.
- Service Disruption. To disrupt the experience of other JFrog users or interfere with the security or integrity of the Services or any other conduct that attempts to disable or overload the Services.
- Harm to Others. To use artificial intelligence to inflict harm, to deceive or misinform, to induce malicious activities, to exploit vulnerabilities, to make decisions without human review to make decisions that could adversely affect one’s health, legal or financial positions, to disrupt civil or political processes, or to confer any negative consequences on individuals, JFrog, end-users or society.
- Bypassing Service Limitations. To bypass, exploit, or disable limitations or restrictions placed on the Services.
- System Security. To compromise the security of the Services. This includes, but is not limited to, engaging in activities that disrupt, interfere with, or inhibit any other user from using and enjoying the Services. Hacking, distributing malware, spamming, phishing, mining cryptocurrency, bypassing security measures, or any other form of unauthorized access is strictly prohibited.
- Reverse Engineering. To use any robot, spider, site search/aggregate application or other device to aggregate, index, “scrape,” or “data mine” any content from the Services.
- Falsification of Identity or Origin. To create a false identity or any attempt to mislead others as to the identity of the user, sender or the origin of any data or communications.
- No Facilitating Misuse. To assist or encourage anyone to do any of the above.
Investigation and Reporting. Violations of this policy may result in temporary or permanent suspension of access to JFrog’s Services. You agree to cooperate with us to remedy any violation. JFrog may report any activity that it suspects violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties.